Hacking Exposed - Network Security Secrets & Solutions, Hacking and IT E-Book Dump Release

[ Pobierz całość w formacie PDF ]
HACKING EXPOSED:
NETWORK SECURITY
SECRETS & SOLUTIONS
SECOND EDITION
JOEL
SCAMBRAY
STUART
MCCLURE
GEORGE
KURTZ
Osborne/
McGraw-Hill
Berkeley
New York
St. Louis
San Francisco
Auckland
Bogotá
Hamburg
London
Madrid
Mexico City
Milan
Montreal
New Delhi
Panama City
Paris
São Paulo
Singapore
Sydney
Tokyo
Toronto
abc
McGraw-Hill
Copyright © 2001 by The McGraw-Hill Companies. All rights reserved. Manufactured in the United States of America. Except as per-
mitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by
any means, or stored in a database or retrieval system, without the prior written permission of the publisher.
0-07-219214-3
The material in this eBook also appears in the print version of this title: 0-07-212748-1.
All trademarks are trademarks of their respective owners. Rather than put a trademark symbol after every occurrence of a trade-
marked name, we use names in an editorial fashion only, and to the benefit of the trademark owner, with no intention of infringe-
ment of the trademark. Where such designations appear in this book, they have been printed with initial caps.
McGraw-Hill eBooks are available at special quantity discounts to use as premiums and sales promotions, or for use in corporate
training programs. For more information, please contact George Hoare, Special Sales, at george_hoare@mcgraw-hill.com or (212)
904-4069.
TERMS OF USE
This is a copyrighted work and The McGraw-Hill Companies, Inc. (“McGraw-Hill”) and its licensors reserve all rights in and to the
work. Use of this work is subject to these terms. Except as permitted under the Copyright Act of 1976 and the right to store and
retrieve one copy of the work, you may not decompile, disassemble, reverse engineer, reproduce, modify, create derivative works
based upon, transmit, distribute, disseminate, sell, publish or sublicense the work or any part of it without McGraw-Hill’s prior con-
sent. You may use the work for your own noncommercial and personal use; any other use of the work is strictly prohibited. Your
right to use the work may be terminated if you fail to comply with these terms.
THE WORK IS PROVIDED “AS IS”. McGRAW-HILL AND ITS LICENSORS MAKE NO GUARANTEES OR WARRANTIES
AS TO THE ACCURACY, ADEQUACY OR COMPLETENESS OF OR RESULTS TO BE OBTAINED FROM USING THE
WORK, INCLUDING ANY INFORMATION THAT CAN BE ACCESSED THROUGH THE WORK VIA HYPERLINK OR
OTHERWISE, AND EXPRESSLY DISCLAIM ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED
TO IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. McGraw-Hill and its
licensors do not warrant or guarantee that the functions contained in the work will meet your requirements or that its operation will
be uninterrupted or error free. Neither McGraw-Hill nor its licensors shall be liable to you or anyone else for any inaccuracy, error
or omission, regardless of cause, in the work or for any damages resulting therefrom. McGraw-Hill has no responsibility for the con-
tent of any information accessed through the work. Under no circumstances shall McGraw-Hill and/or its licensors be liable for any
indirect, incidental, special, punitive, consequential or similar damages that result from the use of or inability to use the work, even
if any of them has been advised of the possibility of such damages. This limitation of liability shall apply to any claim or cause what-
soever whether such claim or cause arises in contract, tort or otherwise.
DOI: 10.1036/0072192143
To my parents and their parents, who set me on the path; to my wife,
who continues to guide me along it; and to my children, who have
taken it in miraculous new directions.
—Joel Scambray
To my wife and child, without whose love and support little else would
matter; and to my parents for their continuing confidence in me.
—Stuart McClure
This book is dedicated to my loving wife, Anna. I could not have
completed two editions of this book without her understanding,
support, and continuous encouragement. I also would like to thank my
entire family for their assistance in helping me “find the time” when
deadlines seemed impossible.
—George Kurtz
To those who seek the truth, may they continue to search free from
restraint and censorship.
—The Authors
vi
Hacking Exposed: Network Security Secrets and Solutions
About the Authors
Joel Scambray
.foundstone.com), where he provides information system security
consulting services to clients ranging from members of the Fortune 50
to newly minted startups. He has field-tested knowledge of numerous
security technologies and has designed and analyzed security archi-
tectures for a variety of applications and products. Mr. Scambray’s
regular publications include the monthly “Ask Us About…Security”
TechNet web site, and the weekly “Security Watch” column in
InfoWorld
published over a dozen technology product analyses. He has held positions as a Manager
for Ernst & Young LLP’s eSecurity Solutions group, Senior Test Center Analyst for
InfoWorld, and Director of IT for a major commercial real estate firm. Mr. Scambray is a
Certified Information Systems Security Professional (CISSP) and Certified Checkpoint
Security Engineer (CCSE).
Joel Scambray can be reached at joel@hackingexposed.com.
Stuart McClure
.foundstone.com) and has over 10 years of IT and security experience.
Mr. McClure specializes in security assessments, firewall reviews,
e-commerce application testing, hosts reviews, PKI technologies,
intrusion detection, and incident response. For over two years,
Mr. McClure has co-authored a weekly column on security called
“Security Watch” for
InfoWorld
magazine, a global security column
addressing topical security issues, exploits, and vulnerabilities.
Mr. McClure has spent the past four years with the both Big 5 security
consulting and the
InfoWorld
Test Center where he tested dozens of network and security
hardware and software products. Prior to
InfoWorld
, Mr. McClure spent over seven years
managing and securing networks and systems ranging from Cisco, Novell, Solaris, AIX,
AS/400, Window NT, and Linux in corporate, academic, and government landscapes.
Stuart McClure can be reached at stuart@hackingexposed.com.
Copyright 2001 The McGraw Hill Companies, Inc. Click Here for Terms of Use.
vii
About the Authors
George Kurtz
cutting edge security consulting and training organization. Mr. Kurtz
is an internationally recognized security expert and has performed
hundreds of firewall, network, and e-commerce related security as-
sessments throughout his security consulting career. Mr. Kurtz has
significant experience with intrusion detection and firewall technolo-
gies, incident response procedures, and remote access solutions. He is
regular speaker at many security conferences and has been quoted in a
wide range of publications, including
The Wall Street Journal,
InfoWorld, USA Today,
and the Associated Press. Mr. Kurtz is routinely called to comment
on breaking security events and has been featured on various television stations, includ-
ing CNN, CNBC, NBC, and ABC.
George Kurtz can be reached at george@hackingexposed.com.
[ Pobierz całość w formacie PDF ]

  • zanotowane.pl
  • doc.pisz.pl
  • pdf.pisz.pl
  • gdziejesc.keep.pl